Experimental PromptLock ransomware uses AI to encrypt, steal data

Picus Blue Report 2025

Threat researchers discovered the first AI-powered ransomware, called PromptLock, that uses Lua scripts to steal and encrypt data on Windows, macOS, and Linux systems. The malware uses OpenAI’s gpt-oss:20b model through the Ollama API to dynamically generate the malicious Lua scripts from hard-coded prompts. How PromptLock works According toESET researchers, PromptLock is written in Golang … Ler mais

O bug crítico do zip deslizamento permite a manipulação de arquivos maliciosos no descompactação

Critical Zip Slip Bug Enables Malicious File Manipulation on Unzip

Falhas de travessia de caminho como o zip Slip, que dão a hackers a capacidade de alterar os sistemas de arquivos enquanto descomprimem, continuam sendo um sério perigo no mundo em constante mudança de ameaças de segurança cibernética. Essa vulnerabilidade, decorrente da validação inadequada de entrada em utilitários de compressão, permite que os adversários incorporem … Ler mais

FreePBX servers hacked via zero-day, emergency fix released

Picus Blue Report 2025

The Sangoma FreePBX Security Team is warning about an actively exploited FreePBX zero-day vulnerability that impacts systems with the Administrator Control Panel (ACP) is exposed to the internet. FreePBX is an open-source PBX (Private Branch Exchange) platform built on top of Asterisk, widely used by businesses, call centers, and service providers to manage voice communications, … Ler mais

Over 28,000 Citrix instances remain exposed to critical RCE flaw CVE-2025-7775

Dutch NCSC: Citrix NetScaler zero-day breaches critical orgs

Over 28,000 Citrix instances remain exposed to critical RCE flaw CVE-2025-7775 Over 28,200 Citrix NetScaler ADC/Gateway instances remain exposed to critical RCE flaw CVE-2025-7775, already under active exploitation. Experts at the Shadowserver Foundation warn that more than 28,200 Citrix instances are vulnerable to the vulnerability CVE-2025-7775, which is under active exploitation. CVE-2025-7775(CVSS score: 9.2) is … Ler mais

IT system supplier cyberattack impacts 200 municipalities in Sweden

Picus Blue Report 2025

A cyberattack on Miljödata, an IT systems supplier for roughly 80% of Sweden’s municipal systems, has caused accessibility problems in more than200 regions of the country. In addition to the service disruption, there are concerns that attackers also stole sensitive data. Local media reportthat the threat actor demanded a ransom of 1.5 (currently around $168,000) … Ler mais

U.S. CISA adds Citrix NetScaler flaw to its Known Exploited Vulnerabilities catalog

U.S. CISA adds D-Link cameras and Network Video Recorder flaws to its Known Exploited Vulnerabilities catalog

U.S. CISA adds Citrix NetScalerflaw to its Known Exploited Vulnerabilities catalog U.S. Cybersecurity and Infrastructure Security Agency (CISA) adds Citrix NetScalerflaw to its Known Exploited Vulnerabilities catalog. The U.S. Cybersecurity and Infrastructure Security Agency (CISA)added Citrix NetScalerflaw, tracked as CVE-2025-7775, to its Known Exploited Vulnerabilities (KEV) catalog. This week, Citrixaddressedthree security flaws (CVE-2025-7775, CVE-2025-7776, CVE-2025-8424) … Ler mais

Global Salt Typhoon hacking campaigns linked to Chinese tech firms

Picus Blue Report 2025

The U.S. National Security Agency (NSA), the UK’s National Cyber Security Centre (NCSC), and partners from over a dozen countries have linked the Salt Typhoon global hacking campaigns to three China-based technology firms. According to the joint advisories [NSA, NCSC], Sichuan Juxinhe Network Technology Co. Ltd., Beijing Huanyu Tianqiong Information Technology Co., and Sichuan Zhixin … Ler mais

CISA Strengthens Software Procurement Security With New Tool

CISA Strengthens Software Procurement Security With New Tool

A new Software Acquisition Guide: Supplier Response Web Tool has been released by the US Cybersecurity and Infrastructure Security Agency (CISA) to improve security in software procurement. The free, interactive platform is designed to assist IT leaders, procurement officersand software vendors in strengthening cybersecurity practices throughout the acquisition process. The tool builds on CISA’s Software … Ler mais

Researchers Discover First Reported AI-Powered Ransomware

Researchers Discover First Reported AI-Powered Ransomware

In what is reportedly a world-first, ESET researchers have discovered PrompLock, a generative AI-powered ransomware implant currently in development. The researchers described it as the “first known AI-powered ransomware.” It utilizes generative AI to execute attacks via a freely available large language model (LLM) that operates locally through an application programming interface (API). However, ESET … Ler mais

Over 28,000 Citrix devices vulnerable to new exploited RCE flaw

Picus Blue Report 2025

More than 28,200 Citrix instances are vulnerable to a critical remote code execution vulnerability tracked as CVE-2025-7775 that is already being exploited in the wild. The vulnerability affectsNetScaler ADC and NetScaler Gateway and the vendor addressed it in updates released yesterday. According to the U.S. Cybersecurity and Infrastructure Security Agency (CISA) and Citrix, the security … Ler mais